A.防御改变CHADDR值的饿死攻击
B.防御DHCP仿冒者攻击
C.防御TCP flag攻击
D.防御中间人攻击和IP/MAC Spoofing攻击
第1题:
A.DHCP Snooping绑定表分为动态绑定表和静态绑定表
B.DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文
C.静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间
D.在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息
第2题:
第3题:
ARP-CHECK功能检查ARP报文合法性的来源有()
第4题:
Which is the result of enabling IP Source Guard on an untrusted switch port that does not have DHCP snooping enabled?()
第5题:
The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()
第6题:
DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()
第7题:
下面哪项不是防范ARP攻击的有效方法()。
第8题:
DHCP requests will be switched in the software, which may result in lengthy response times.
The switch will run out of ACL hardware resources.
All DHCP requests will pass through the switch untested.
The DHCP server reply will be dropped and the client will not be able to obtain an IP address.
第9题:
防御改变CHADDR值的饿死攻击
防御DHCP仿冒者攻击
防御TCP flag攻击
防御中间人攻击和IP/MAC Spoofing攻击
第10题:
Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCP request messages.
Configure DHCP snooping globally.
Configure the switch as a DHCP server.
Configure DHCP snooping on an interface.
Configure all interfaces as DHCP snooping trusted interfaces.
Configure DHCP snooping on a VLAN or range of VLANs.
第11题:
防御改变CHADOR值的饿死攻击
防御DHCP仿冒者攻击
防御TCpflag攻击
防御中间人攻击和IP/MACSpoofing攻击
第12题:
配置trust/untrusted接口
限制交换机接口上允许学习到的最多MAC地址数目
开启DHCPSnooping检查DHCP REQUEST报文中CHADOR字段的功能
在交换机上配置DHCP Snooping域DAI或IPSG进行联动
第13题:
A.IP-MAC静态绑定
B.使用类似port security的功能
C.加强用户权限控制
D.DHCP Snooping+DAI技术
第14题:
在启动了DHCP的网络有可能会发生什么类型的攻击?()
第15题:
当网络中出现中间人攻击时,采取什么方式防御().
第16题:
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
第17题:
Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()
第18题:
DHCP监听(DHCPSnooping)是一种DHCP安全特性,可以有效防范DHCPSnooping攻击,以下哪条不是该安全特性的描述()。
第19题:
Attacker sends multiple DHCP requests flooding DHCP server
Attacker connects rogue server initiating DHCP requests
Attacker connects rogue server replying to DHCP requests
Attacker sends DHCP jam signal causing DHCP server to crash
Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
第20题:
DHCP Snooping绑定表分为动态绑定表和静态绑定表
DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCPReply报文
静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间
在二层上应用DHCP Snooping,不配置Option82功能也可以获得绑定表所需的接门信息
第21题:
DHCP Snooping绑定表分为动态绑定表和静态绑定表
DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文
静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间
在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息
第22题:
防止DHCP防冒者攻击
防止对DHCP服务器的DOS攻击
防止MAC地址泛洪攻击
结合DAI功能对数据包的源MAC地址进行检查
结合IPSG功能对数据包的源IP地址进行检查
第23题:
配置Trusted/Untrusted接口
限制交换机接口上允许学习到的最多MAC地址数目
使用DHCP Snooping检查DHCP REQUEST报文中CHADDR字段的功能
在交换机上配置DHCP Snooping功能
第24题:
DHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.
When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.
The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.
Globally disabling DHCP snooping removes all DHCP snooping configuration on the switch.
Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.